Fraud Prevention Reports

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Network Security: Spotlight on Australia/New Zealand
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 08 Feb 2021 | Published: 21 Jun 2018

TechTarget ComputerWeekly.com

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance
sponsored by Oracle Corporation
WHITE PAPER: Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
Posted: 11 May 2011 | Published: 11 May 2011

Oracle Corporation

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

How to prevent phishing attacks: User awareness and training
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

TechTarget Security

Cisco PCI Compliance Services
sponsored by Cisco Systems, Inc.
BROCHURE: Cisco PCI Compliance Services assist companies in achieving and maintaining PCI compliance. Read about vulnerability and gap assessments, remediation work to achieve compliance, and continuous monitoring to maintain PCI compliance.
Posted: 08 Jul 2008 | Published: 01 Dec 2007

Cisco Systems, Inc.